咨询与建议

限定检索结果

文献类型

  • 3,143 篇 会议
  • 2,820 篇 期刊文献
  • 87 册 图书

馆藏范围

  • 6,050 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,693 篇 工学
    • 2,331 篇 计算机科学与技术...
    • 1,909 篇 软件工程
    • 824 篇 控制科学与工程
    • 720 篇 信息与通信工程
    • 518 篇 电气工程
    • 461 篇 生物工程
    • 445 篇 电子科学与技术(可...
    • 419 篇 生物医学工程(可授...
    • 333 篇 机械工程
    • 309 篇 光学工程
    • 279 篇 仪器科学与技术
    • 160 篇 动力工程及工程热...
    • 150 篇 化学工程与技术
    • 138 篇 交通运输工程
    • 121 篇 安全科学与工程
    • 110 篇 网络空间安全
  • 2,089 篇 理学
    • 949 篇 数学
    • 700 篇 物理学
    • 532 篇 生物学
    • 305 篇 系统科学
    • 296 篇 统计学(可授理学、...
    • 187 篇 化学
  • 909 篇 管理学
    • 609 篇 管理科学与工程(可...
    • 322 篇 图书情报与档案管...
    • 265 篇 工商管理
  • 463 篇 医学
    • 388 篇 临床医学
    • 316 篇 基础医学(可授医学...
    • 204 篇 药学(可授医学、理...
    • 168 篇 公共卫生与预防医...
  • 135 篇 法学
    • 112 篇 社会学
  • 96 篇 经济学
  • 82 篇 教育学
  • 79 篇 农学
  • 16 篇 艺术学
  • 14 篇 文学
  • 11 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 192 篇 deep learning
  • 183 篇 machine learning
  • 123 篇 control systems
  • 121 篇 accuracy
  • 118 篇 artificial intel...
  • 102 篇 feature extracti...
  • 100 篇 computational mo...
  • 85 篇 internet of thin...
  • 76 篇 optimization
  • 73 篇 training
  • 72 篇 real-time system...
  • 63 篇 predictive model...
  • 62 篇 neural networks
  • 58 篇 support vector m...
  • 56 篇 robustness
  • 55 篇 computer science
  • 54 篇 genetic algorith...
  • 53 篇 convolutional ne...
  • 52 篇 image segmentati...
  • 51 篇 testing

机构

  • 95 篇 institut univers...
  • 93 篇 north-west unive...
  • 91 篇 national centre ...
  • 90 篇 tno technical sc...
  • 87 篇 infn sezione di ...
  • 87 篇 université de st...
  • 81 篇 nikhef national ...
  • 80 篇 university of jo...
  • 80 篇 ncsr demokritos ...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 74 篇 infn sezione di ...
  • 71 篇 university würzb...
  • 70 篇 university moham...
  • 66 篇 università di ca...
  • 65 篇 infn sezione di ...
  • 60 篇 western sydney u...
  • 57 篇 university moham...
  • 56 篇 university of am...
  • 55 篇 leiden universit...

作者

  • 96 篇 ferrara g.
  • 96 篇 ardid m.
  • 95 篇 calvo d.
  • 93 篇 chen a.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 85 篇 díaz a.f.
  • 85 篇 boumaaza j.
  • 85 篇 enzenhöfer a.
  • 84 篇 coleiro a.
  • 84 篇 gozzini s.r.
  • 84 篇 dallier r.
  • 83 篇 celli s.
  • 82 篇 boettcher m.
  • 80 篇 carretero v.
  • 79 篇 dornic d.
  • 77 篇 bendahman m.
  • 77 篇 brunner j.
  • 76 篇 cherubini s.
  • 75 篇 di palma i.

语言

  • 5,308 篇 英文
  • 700 篇 其他
  • 32 篇 中文
  • 9 篇 日文
  • 6 篇 德文
  • 3 篇 法文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Control and Computer Engineering Faculty of Engineering and Computing"
6050 条 记 录,以下是801-810 订阅
排序:
Privacy Enhanced Mobile User Authentication Method Using Motion Sensors
收藏 引用
computer Modeling in engineering & Sciences 2024年 第3期138卷 3013-3032页
作者: Chunlin Xiong Zhengqiu Weng Jia Liu Liang Gu Fayez Alqahtani Amr Gafar Pradip Kumar Sharma Shenzhen Institutes of Advanced Technology Chinese Academy of SciencesShenzhen518052China Sangfor Technologies Inc. Shenzhen518055China School of Data Science and Artificial Intelligence Wenzhou University of TechnologyWenzhou325035China College of Computer Science&Technology Zhejiang University of TechnologyHangzhou310023China Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Math&Computer Science Department Faculty of ScienceMenofia UniversityShebin El-KomEgypt Computing Science Department University of AberdeenAberdeenUK
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protecti... 详细信息
来源: 评论
Novel Federated Decision Making for Distribution of Anti-SARS-CoV-2 Monoclonal Antibody to Eligible High-Risk Patients
收藏 引用
International Journal of Information Technology and Decision Making 2024年 第1期23卷 197-268页
作者: AlSereidi, Abeer Salih, Sarah Qahtan M. Mohammed, R.T. Zaidan, A.A. Albayati, Hassan Pamucar, Dragan Albahri, A.S. Zaidan, B.B. Shaalan, Khaled Al-Obaidi, Jameel Albahri, O.S. Alamoodi, Abdulah Majid, Nazia Abdul Garfan, Salem Al-Samarraay, M.S. Jasim, A.N. Baqer, M.J. Faculty of Engineering & IT The British university in Dubia United Arab Emirates United Arab Emirates Department of Computer Center Middle Technical University's Baghdad Iraq Sulaymaniyah Iraq Department of Business Administration College of Administrative Science The University of Mashreq Baghdad10021 Iraq University of Defence in Belgrade Department of Logistic Pavla Jurisica Sturma 33 Belgrade11000 Serbia Baghdad Iraq Baghdad Iraq Future Technology Research Center National Yunlin University of Science and Technology 123 University Road Section 3 Yunlin Douliu64002 Taiwan Department of Biology Faculty of Science and Mathematics Universiti Pendidikan Sultan Idris Tanjong Malim Perak 35900 Malaysia Computer Techniques Engineering Department Mazaya University College Thi-Qar Nassiriya Iraq Department of Computing Faculty of Arts Computing and Creative Industry Universiti Pendidikan Sultan Idris Tanjung Malim Malaysia Institute of Biological Sciences Faculty of Science Universiti Malaya Kuala Lumpur50603 Malaysia Foundation of Alshuhda Baghdad Iraq
Context: When the epidemic ¯rst broke out, no speci¯c treatment was available for severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). The urgent need to end this unusual situation has resulted in m... 详细信息
来源: 评论
Inventory Management System based on IoT and Microservices Architecture Design
Inventory Management System based on IoT and Microservices A...
收藏 引用
2023 International Electrical engineering Congress, iEECON 2023
作者: Sithiyopasakul, Paisan Piyatananugoon, Chavinkorn Chaowalittawin, Vasutorn Krungseanmuang, Woranidtha Sathaporn, Posathip Kanjanasurat, Isoon Purahong, Boonchana Archevapanich, Tunjai Lasakul, Attasit King Mongkut's Institute of Technology Ladkrabang Computer Engineering Department Bangkok Thailand School of Engineering King Mongkut's Institute of Technology Ladkrabang Bangkok Thailand College of Computing Khon Kean University KhonKean Thailand Rajamangala University of Technology Suvarnabhumi Faculty of Engineering and Architecture Nonthaburi Thailand
This paper presents the inventory management system based on IoT and microservices architecture that synced between IoT (Internet of Things) and web application. There are two main parts consisting of IoT forklift veh... 详细信息
来源: 评论
Voice Enabled Intelligent Programming Assistant  4
Voice Enabled Intelligent Programming Assistant
收藏 引用
4th International Conference on Advancements in computing, ICAC 2022
作者: Wataketiya, Ravindu Chandrasiri, Navinda Kithsiri, Ramesh Malwatta, Hirush Nadeeshani, Madhuka Siriwardana, Samanthi Department of Computer Science and Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Information Technology Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
In modern era where software development is of vital importance, software developers are challenged with conditions like Repetitive Strain Injury (RSI) which hinders their ability to work effectively. Furthermore, peo... 详细信息
来源: 评论
Towards Accurate RPM Detection Using Primary Ignition Pulses
Towards Accurate RPM Detection Using Primary Ignition Pulses
收藏 引用
Annual Conference of Industrial Electronics Society
作者: Jaliya L. Wijayaraja Nimsiri Abhayasinghe Sasini Wellalage Department of Computer Systems Engineering Faculty of Computing SLIIT Malabe Sri Lanka Department of Electrical and Electronic Engineering Faculty of Engineering SLIIT Malabe Sri Lanka
Enhancing the performance and extending the life-cycle of older vehicles through retrofitting with improved systems presents an alluring opportunity. However, achieving accurate sensing of crucial parameters, such as ...
来源: 评论
SNCA:Semi-Supervised Node Classification for Evolving Large Attributed Graphs
收藏 引用
Big Data Mining and Analytics 2024年 第3期7卷 794-808页
作者: Faima Abbasi Muhammad Muzammal Qiang Qu Farhan Riaz Jawad Ashraf Luxembourg Institute of Science and Technology and University of Luxembourg Esch-Sur-Alzette L-4362Luxembourg Department of Computer and Information Sciences Northumbria UniversityNewcastle NE18STUK Shenzhen Institute of Advanced Technology Chinese Academy of SciencesShenzhen 518055China School of Computer Science University of LincolnLincoln LN67TSUK Faculty of Computing Engineering and MediaDe Montfort UniversityLeicesterLE19BHUK
Attributed graphs have an additional sign vector for each ***,edge signs represent like or dislike relationship between the node *** has applications in domains,such as recommender systems,personalised search,***,limi... 详细信息
来源: 评论
MRI Brain Tumor Classification Using Optimized APSO-LLRBFNN  2
MRI Brain Tumor Classification Using Optimized APSO-LLRBFNN
收藏 引用
2nd International Conference on Machine Learning and Autonomous Systems, ICMLAS 2025
作者: Krishna, Tiruveedula Gopi Sreenivas, Nune Ajay Kumar, M. Reddy, Chandra Sekhar Rathee, Davinder Sing Urgessa, Teklu College of Electrical Engineering and Computing Adama Science and Technology University Department of Computer Science and Engineering Adama Ethiopia Andhra Loyala institute of Engineering and Technology Department of Electrical and Electronics Engineering Vijayawada India College of Electrical Engineering and Computing Adama Science and Technology University Department of Electrical Power and Control Engineering Adama Ethiopia College of Electrical Engineering and Computing Adama Science and Technology University Department of ECE Adama Ethiopia
The research presents a new efficient machine learning method to classify brain tumors because this task remains vital in fighting the high incidence of brain cancers. The proposed approach unites all its operations i... 详细信息
来源: 评论
Intrusion Detection in Smart IoT Devices for People with Disabilities  8
Intrusion Detection in Smart IoT Devices for People with Dis...
收藏 引用
8th IEEE International Smart Cities Conference, ISC2 2022
作者: Naveed, Muhammad Usman, Syed Muhammad Satti, Muhammad Islam Aleshaiker, Sama Anwar, Aamir Shaheed Zulfikar Ali Bhutto Institute of Science and Technology Department of Computer Science Islamabad Pakistan Ai Air University Faculty of Computing Department of Creative Technologies Islamabad Pakistan Riphah University Faculty of Computer Science and Software Engineering Islamabad Pakistan School of Computing & Engineering University of West London London United Kingdom
An intrusion Detection System (IDS) is a system that resides inside the network and monitors all incoming and outgoing traffic. It prevents unethical activities from happening over the network. With the use of IoT dev... 详细信息
来源: 评论
Development of Low Resource Machine Learning Models for Child Cognitive Ability Assessments  4
Development of Low Resource Machine Learning Models for Chil...
收藏 引用
4th International Conference on Advancements in computing, ICAC 2022
作者: Kahawanugoda, Adithya Gnanarathna, Kulanika Meegoda, Nilan Monarawila, Randika Samarasinghe, Pradeepa Lindamulage, Asiri Gawesha Department of Computer Science and Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Information Technology Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
Automated cognitive assessment tools are state-of-the-art in assessing cognition development. Due to the low availability of resources, building automated cognitive ability evaluation tools is challenging. This study ... 详细信息
来源: 评论
Polymorphic Security Enhancements for Corporate Environments Utilizing Behavior Analytics
Polymorphic Security Enhancements for Corporate Environments...
收藏 引用
International Conference on computer and Applications (ICCA)
作者: Wijesinghe W.M.A. J Abeysinghe Y.P. P Rukshana M.A. F Adhikari A.M.P. S Kavinga Yapa Abeywardhana Deemantha Siriwardhana Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
Employers should recognize that employees are the most vulnerable aspect of business environments since these cyber hazards are growing because of user neglect, lack of fundamental security discipline, and a fast-chan... 详细信息
来源: 评论